DOE Joint ICAM Program - Unclass & Secret Fabrics

Similar documents
DEPARTMENTAL REGULATION

Office of the Chief Information Officer Department of Energy Identity, Credential, and Access Management (ICAM)

Panel and Session Speaker Bios: Spring 2014 ICAM Information Sharing Day and Vendor Expo

SYSTEM NAME: Digital Identity Access Management System (DIAMS) - P281. SYSTEM LOCATION: U.S. Department of Housing and Urban Development, 451 Seventh

Identity, Credential, and Access Management at NASA, from Zachman to Attributes

U.S. Department of Agriculture HSPD 12 Program. USDA HSPD-12 Implementing PIV USDA

Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance

NATIONAL DIRECTIVE FOR IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT CAPABILITIES (ICAM) ON THE UNITED STATES (US) FEDERAL SECRET FABRIC

U.S. Department of Energy Washington, D.C.

Department of Veterans Affairs VA DIRECTIVE 6510 VA IDENTITY AND ACCESS MANAGEMENT

FOUR PILLARS FOR A SUCCESSFUL PIV ECOSYSTEM

Identity, Credential, and Access Management. An information exchange For Information Security and Privacy Advisory Board

HSPD-12 Homeland Security Presidential Directive #12 Overview

Identity, Credential, and Access Management. Open Solutions for Open Government

Status: Final. Form Date: 30-SEP-13. Question 1: OPDIV Question 1 Answer: OS

An Operational Architecture for Federated Identity Management

USDA Identity, Credential and Access Management

NEIS HELP DESK FAQS. HSPD-12 Policy/Business Process. General HSPD-12 FAQs can be found online at:

PROTECT YOUR WORLD. Identity Management Solutions and Services

2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed.

Shared Services Canada (SSC)

Federal Identity, Credentialing, and Access Management. Identity Scheme Adoption Process

Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance

Understanding the differences in PIV, PIV-I, PIV-C August 23, 2010

U.S. DEPARTMENT OF COMMERCE UNITED STATES PATENT AND TRADEMARK OFFICE. Privacy Impact Assessment

Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education

Using FICAM as a model for TSCP Best Prac:ces in Physical Iden:ty and Access Management. TSCP Symposium November 2013

PRIVACY IMPACT ASSESSMENT (PIA) For the

Single Sign-On. Security and comfort can be friend. Arnd Langguth. September, 2006

Evaluation Report. Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review. April 30, 2014 Report Number 14-12

Identity & Privacy Protection

I. U.S. Government Privacy Laws

The Convergence of IT Security and Physical Access Control

Information Systems Security Line of Business (ISS LoB)

From. Medusa. Midas. Lynn Kluegel Glen Lee. Lee Neely. Melissa Nimmo LA-UR Unclassified

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach

Executive Summary P 1. ActivIdentity

NOAA HSPD-12 PIV-II Implementation October 23, Who is responsible for implementation of HSPD-12 PIV-II?

Automated User Provisioning

Safeguards and Security

Office of the Assistant Secretary for Administration and Management Washington, D.C ELLIOT P. LEWIS Assistant Inspector General for Audit

Cloud Computing Best Practices. Creating Effective Cloud Computing Contracts for the Federal Government: Best Practices for Acquiring IT as a Service

DHS Trusted Identity Exchange

Federal Identity, Credential, and Access Management Trust Framework Solutions. Relying Party Guidance For Accepting Externally-Issued Credentials

Identity, Credential, and Access Management

The Convergence of IT Security and Physical Access Control

HSPD-12 Implementation Architecture Working Group Concept Overview. Version 1.0 March 17, 2006

Privacy Impact Assessment (PIA) for the. Certification & Accreditation (C&A) Web (SBU)

Strong Authentication for Future Web Applications

Enable Your Applications for CAC and PIV Smart Cards

Frequently Asked Questions (FAQs) SIPRNet Hardware Token

STATEMENT OF SYLVIA BURNS CHIEF INFORMATION OFFICER U.S. DEPARTMENT OF THE INTERIOR BEFORE THE

Presentation to House Committee on Technology: HHS System Identity & Access Management

SUBJECT: systems. in DoD. capabilities. d. Aligns identity. (Reference (c)). (1) OSD, the Staff and

How can Identity and Access Management help me to improve compliance and drive business performance?

Identity and Access Management Initiatives in the United States Government

TECHNOLOGY BRIEF CA Technologies Solutions for Identity, Credential, and Access Management Michael Liou CA Security Management

Seeing Though the Clouds

Quest One Identity Solution. Simplifying Identity and Access Management

ICAM Privileged User Instruction and Implementation Guidance. Version 1.0

Defense Information Systems Agency A Combat Support Agency. Identity and Access Management (IdAM): Consistent Access to Capability

Government of Canada Directory Services Architecture. Presentation to the Architecture Framework Advisory Committee November 4, 2013

Mixed Life Cycle FY2002

State Identity, Credential, and Access Management (SICAM) Roadmap and Implementation Guidance Version 2.0 October 14, 2013

Federal Cloud Computing Initiative Overview

The Imperative for High Assurance Credentials: State Identity Credential and Access Management (SICAM) Guidance and Roadmap

White Paper: DOE/NNSA Information Technology Modernization Strategy

GAO PERSONAL ID VERIFICATION. Agencies Should Set a Higher Priority on Using the Capabilities of Standardized Identification Cards

Identity and Access Management The road to sustained compliance

Justice Management Division

MHS Health Information Technology Transformation March 1, 2016

2NV Update. A look at where we are in the delivery of 2NV Wayne Jones, NNSA CIO Melissa Ujczo-Kovachich, IT Project Manager

State of Alaska Enterprise Messaging and Directory Services Strategy Vision and Scope

etoken TMS (Token Management System) Frequently Asked Questions

EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07

OFFICE OF THE CHIEF INFORMATION OFFICER IDENTITY, CREDENTIAL, & ACCESS MANAGEMENT PROGRAM. Logging In with my LincPass

Security Control Standard

Department of Homeland Security

State Identity Credential and Access Management (SICAM) Guidance and Roadmap

POSTAL REGULATORY COMMISSION

Introduction to SAML

IDaaS: Managed Credentials for Local & State Emergency Responders

NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL

Committee on National Security Systems

Department of Defense INSTRUCTION

AUDIT REPORT. The National Nuclear Security Administration s Network Vision Initiative

Stephen Hess. Jim Livingston. Program Name. IAM Executive Sponsors. Identity & Access Management Program Charter Dated 3 Jun 15

U.S. Department of Labor Digital Government Strategy (DGS) Milestone #6.3 Improving Digital Services

Transcription:

DOE Joint ICAM Program - Unclass & Secret Fabrics GSA Federal ICAM Day, 16 April 2014 Mr. Frank Husson & Mr. Rich Tannich Unclassified

Agenda Unclassified Initiative Mr. Frank Husson will share DOE s vision of OneID, which will deliver a set of identity and access management services in YOURcloud, DOE's hybrid community cloud environment. Secret Fabric Initiative Mr. Rich Tannich will share the successes that have prepared DOE to implement PKI tokens and how the OneID efforts will be leveraged on the Secret Fabric.

DOE ICAM Initiative Enabled through OneID Mr. Frank Husson DOE ICAM Agency Lead Official Office of the Chief Information Officer Department of Energy Frank.Husson@hq.doe.gov

OneID at-a-glance OneID is an architectural solution being driven by DOE and NNSA to streamline business processes and strengthen authentication capabilities associated with both physical and logical access. OneID federates the management of identity data, leaving the oversight functions of commissioning and decommissioning cyber access to the owners or hosts of those identities. Owner: Developer: Status: DOE Associate CIO (ACIO) for Energy IT Services (EITS/IM-60) Lawrence Livermore National Laboratory (LLNL) Release 1.0 of OneID Deployed within YOURcloud Enclave Initial Operational Capability Targeted for Q2FY14 4

Value of OneID to End Users Single Sign-On Jane can logon at her site and have single sign-on access to DOE applications and other Federal Agency applications. DOE Applications Other Agency Applications (DOD, DHS, NASA, OMB, DOS, DOJ) Site-to-Site Visits Jane can visit a DOE site and reduce (or eliminate) time spent at the visitor s office. All DOE sites have access to the information it needs to pre-provision Jane s access to it s facilities, networks, and applications. Access Authorizations OneID provides data for applications to determine if Jane has the appropriate clearance level to: View documents Attend meetings Access facilities Site Collaboration Local OneID infrastructure can be leveraged to authenticate to applications hosted within each site. DOE White Pages Jane can find work email address and phone numbers of a colleagues within DOE. Single Identity in DOE DUID: DOE1234567890 Name: Jane Smith Employee Type: Contractor Affiliation: LLNL Clearance Level: Q HSPD-12 Badge #: 89001122334455 SSN: 123-45-6789 Other data Physical Access Provision facility s access system with Jane s current user information, including clearance and HSPD-12 data. Network Logon OneID provides current HSPD-12 data to configure Jane s network accounts for mandatory PIV logon. DOE HQ Jane Smith Retired Fed @ DOE HQ SSN: 123-45-6789 Other site data NNSA Sites Jane Smith Contractor @ LLNL SSN: 123-45-6789 Other site data Clearance Data Jane Smith Clearance Level Q SSN: 123-45-6789 Other clearance data HSPD-12 Data Jane Smith HSPD-12: 89001122334455 SSN: 123-45-6789 Other HSPD-12 data Other DOE Sites 5

DOE HQ Current State Applications obtain PII from users (or by agents) to determine a person s identity. Protecting PII with OneID Control and Secure Exposure of PII Target State with OneID correlates PII from authoritative systems ( sources of truth ) on a private network to establish a person s DOE Unique Identity (i.e., DUID). NNSA Sites SC Sites DOE App A DOE App B DOE App C SC Sites Energy Sites NNSA Sites DOE HQ OneID conveys the DUID where only a unique identity is required DOE App A DOE App B DOE App C Energy Sites EM Sites PIV Card System Clearance System PII is required to process clearances EM Sites PMA Sites Clearance System OneID securely transmits the minimum PII where required PIV Card System Clearance System PII is required to process clearances PMA Sites PII is required to issue PIV Cards DOE HSPD-12 PII is required to issue PIV Cards 6

Summary The end goal for OneID and ICAM is to extend OneID capabilities enterprise-wide and leverage capabilities on the secret fabric, where appropriate. OneID will: Reduce the number of connections transmitting PII between application and users Eliminate the need to leverage PII at the application tier for most DOE/NNSA applications Improve Security by rapidly deprovisioning access to all supported applications Enable a bring-your-own-credential model for DOE sites, labs, and plants that is extensible and will accommodate future needs of DOE Path Forward Complete NNSA site integration Finalize scope and project plan for release 2.0 Develop consensus on multiyear OneID Roadmap Proposal for Physical Access Proposal for classified (secret fabric) adoption Proposal for DOE adoption FY14-15 Briefing and Proposal for FY16 and beyond (budget planning) 7

Partnership on the National Secret Fabric Mr. Rich Tannich DOE Secret Fabric ICAM Program Manager Office of the Chief Information Officer National Nuclear Security Administration Rich.Tannich@nnsa.doe.gov

ICAM Includes DOE considers ICAM to represent the intersection of digital identities, credentials and access control into one comprehensive approach that is focused on delivering greater convenience and improved security and privacy protection, with less effort and at a lower cost. ICAM includes: Digital Identity Credentialing Privilege Management Authentication Authorization / Access Federation Cryptography Auditing / Reporting 9

National Partnership Began negotiating with DSAWG for MOU between DOE and DoD (2010) Built the ESN SIPRNet Gateway to DOD (2011) Established the Computer Network Defense Service Provider (CNDSP) (2011) Built the NNSA Secret Network (NSN) and migrated 11 dedicated Point-to-Point circuits from the labs/plants to SIPRNet (2012) Built the DOE Cyber Command Readiness Inspection (CCRI) (2013) Joined CNSS and became part of the DISA PKI Common Service Provider (CSP) with 17,000 users on the Secret Fabric (2013) Established the CSP Governance Board (2013) Building PKI to reach IOC with 10% of population issued tokens for network authentication (December 2014) Working with SafeNet and NSA to approve domain-aware token (2014) Establishing Joint DOE ICAM program with Unclassified initiative to integrate OneID for users on both fabrics (2014) Re-engineering ESN to accommodate OneID (2014) 10

ESN Re-engineering ESN has a mature Identity and Access Management solution in place since 2009. ESN products are end of life, costly to maintain and not gracefully modified to support ICAM requirements. Changing landscape of DOE Secret environment and Federal Secret fabric requires a more flexible, modular approach to identity management. Plan to leverage the OneID Attribute Exchange Service (AES) to incorporate into the new classified IdM solution. Data will be moved from AES into the classified environment via a data diode, where it will be supplemented with additional user attributes available only in the Secret environment, including: Classified e-mail address Access Authorizations for Sigma categories Need to Know (NTK) group membership New ESN design, including software and tools, will be used in other Secret environments, such as NSN. 11

National Alignment DOE Joint ICAM initiative is closely aligned with the requirements and milestones from both: Committee on National Security Systems (CNSS) Information Sharing and Access Interagency Policy Committee (ISA IPC) DOE personnel strategically embedded in leadership roles in both National organizations to influence the direction of the Federal ICAM (FICAM) initiative. 12

Thank You Mr. Frank Husson DOE ICAM Agency Lead Official Office of the Chief Information Officer Department of Energy Frank.Husson@hq.doe.gov Mr. Rich Tannich DOE Secret Fabric ICAM Program Manager Office of the Chief Information Officer National Nuclear Security Administration Rich.Tannich@nnsa.doe.gov

ICAM Day USDA ICAM Program April 16, 2014

USDA ICAM Program Background Services Statistics Logical architecture Roadmap 15

ICAM Organization in USDA The role of the USDA OCIO s office is to provide technical solutions for the 7 mission areas to allow bureaus to focus on their respective mission. USDA OCIO ICAM ICAM responsibilities are distributed in USDA: Departmental Management - Office of Homeland Security and Emergency Coordination is responsible for PIV issuance and physical access control (e.g. facilities, buildings) Office of the CIO ICAM Program is responsible for enterprise identity management, single sign-on access to USDA web-based and mobile applications, digital signature, enterprise role based authorization, and logical access control guidance Office of the CFO National Finance Center is responsible for managing the employee and contractor human resource 16 records.

USDA ICAM History Went live with eauthentication as a highly-available enterprise-wide service for web single sign-on in 2003 as part of the egov initiative Approved as one of GSA s eauthentication identity providers (IdP) for external federated identities in 2006 Integrated HR and HSPD-12 systems to automate and streamline identity management and PIV card issuance in 2007 Enabled LincPass (PIV) authentication for LACS in 2010 Expanded the ICAM program to manage the full identity lifecycle, including on\off-boarding, provisioning, and RBAC in 2011 with the EEMS Service 141 apps integrated 289 apps integrated 475+ apps integrated IdP 2003 2014 17 A decade of evolution!

USDA ICAM Services Provides identity lifecycle management & access control to the entire USDA enterprise (29 agencies\bureaus) Identity Management: On-board & off-board employees Automated Provisioning of Accounts and Permissions Entitlement Management Access Management: Web Single Sign-On (475+ Applications, 4 million logons per month) PIV-Enablement Federated Authentication with External Partners Shared Service offering supports non-usda Federal Agencies 18

USDA ICAM Statistics* ICAM supports USDA and its sub-agencies (e.g., Forest Service & Animal, Plant, Health Inspection Service) ICAM partners with other federal agencies (e.g., HHS, DOJ, NIH, DOI, OPM) ICAM is federated with external entities (e.g., SalesForce.com, GovTrip, eopf) 642,312 total accounts (internal USDA & public citizen accounts in eauthentication) 104,357 active internal USDA accounts 475+ applications (internal and public-facing) protected with eauthentication 4,806,940 authentication events (logins) per month 198,728,073 single sign-on transactions per month 19 *Statistics as of 4/08/2014

ICAM Logical Architecture Authoritative Data Sources USAccess Payroll HR Non-Emp Single Identity HR Data Feed Reporting Engine Role & Compliance Management USDA Services Identity Manager Provisioning Server Identity Correlation & Sync epacs Active Directory Enterprise Directory eauth Resource Domain App User Store ICAM Web \ Mobile Application Federated Web Application USDA Customers & Partners USDA Employees & Contractors External Partners

Roadmap ICAM as a Service Provides federated identity, credential, and access management services for Federal Agency systems. Federation Enhancements Interoperability with federal agency partners Acceptance of externally issued credentials for citizens\customers Identity data\attribute exchange PIV-Derived Credentials Enhanced mobile computing integration Expand Identity Management services 21 Role and Compliance Management

USDA ICAM Team Adam Zeimet, Chief Architect (Acting Director) 970-295-5678 Adam.Zeimet@ocio.usda.gov Shari Erickson, ICAM Deputy Director 970-295-5128 Shari.Erickson@ocio.usda.gov Jake Guzman, ISSO 970-295-5150 Jacob.Guzman@ocio.usda.gov 19

ICAM Day Realizing the Benefits of ICAM Ken Calabrese Associate Director, Office of Security and Strategic Information and HSPD-12 Program Manager Department of Health and Human Services April 2014 24

Status of HSPD-12 at HHS Over 70% of non-privileged staff required to use PIV card to access network Implementation of Alternate Logon Token (ALT) card has been initiated for privileged accounts Non-identity card interoperable with PIV PACS integrated with LACS Implementation of Restricted Local Access (RLA) for short term staff and foreign nationals not qualifying for PIV Identity card interoperable with PIV Simplified Signon provides access to HHS and line of business applications using PIV 25

Benefits of ICAM User Perspective Simplified access to infrequently used applications Common credential to access systems Network Remote VPN Applications Substantially reduced help desk calls for password resets Digital signature Simplified access to facilities Permanent duty station Authorized facilities HHS-wide 26

Benefits of ICAM Security Strong authentication for direct and remote access to networks and applications ICAM caused HHS to review level of access and implement appropriate credential Assurance of background investigation HSPD-12 caused HHS to assure all staff have NACI Foreign Nationals HSPD-12 caused HHS to address challenges with background investigations for foreign nationals Integration of PACS and LACS assures physical access immediately revoked 27

Benefits of ICAM Security (Continued) Common identity card across HHS/Federal Government HHS would not have mandated single card itself Complete database of all staff Currently most complete people repository in HHS HHS-wide unique identifier facilities elimination of social security numbers as unique identifier in applications Last four digits of unique identifier used as security code to access VISA card account supporting subsidized transit in place of last four of social security number Unique identifier allows correlation between systems such as HR and Active Directory 28